Month: March 2024
DNA storage is coming, it’s just a matter of when not if — SNIA quietly unveils first specifications for storing bytes in DNA medium, an important first step towards almost ultra-cheap, limitless storage
DNA Data Storage Alliance has unveiled Sector Zero and Sector One specifications for storing data in DNA.
Data will soon be able to be stored in DNA. French startup Biomemory has already shipped a DNA storage device to the general public. Now the DNA Data Storage Alliance, a technology affiliate of the Storage Networking Industry Association (SNIA), has unveiled the first specifications for storing vendor and CODEC information within a DNA data archive.
Unlike traditional storage mediums such as tape, HDD, and SSD, DNA lacks a fixed physical structure, necessitating a unique mechanism for reading or “booting up” a DNA archive.
The SNIA DNA Archive Rosetta Stone (DARS) working group has developed two specifications, Sector Zero and Sector One, to enable archive readers to find the sequence to begin booting up the data.
Getting closer
Sector Zero provides the minimal information needed for the archive reader to identify the CODEC used to encode Sector One and the company that synthesized the DNA. Sector One includes information such as a description of contents, a file table, and parameters to transfer to a sequencer.
“A key goal of the DNA Data Storage Alliance is to set and publish specifications and standards that allow an interoperable DNA data storage ecosystem to grow,” said Dave Landsman, of the DNA Data Storage Alliance Board of Directors.
While there’s still a long way to go before DNA storage becomes the norm, Landsman believes we’re much closer to it than you might imagine. “With the publishing of the Alliance’s first specifications, we take an important step in achieving that goal,” he said. “Sector Zero and Sector One are now publicly available, allowing companies working in the space to adopt and implement.”
More from TechRadar Pro
DNA storage finally reaches mainstream (well, sort of)1200TB SSD modules are in the pipeline thanks to Pure StorageThis is what a ceramic cartridge with a 10,000TB capacity looks like
An ancient Linux flaw might be opening up users to dangerous cyberattacks
Hackers can easily trick you into giving away your password, or tamper with your clipboard.
Many versions of Linux may be vulnerable to a flaw that allowed hackers to steal passwords, or change the contents of their clipboard.
The vulnerability, however, comes with a major caveat that makes exploitations somewhat unlikely (or at least heavily limited).
Cybersecurity researcher Skyler Ferrante recently discovered an “improper neutralization of escape sequences in wall” vulnerability, a flaw impacting the “wall” command. This command is usually used to broadcast messages to the terminals of all users logged to the same system.
WallEscape
With escape sequences not being properly filtered when processing input through command line arguments, a threat actor could, theoretically, launch a prompt to all connected users and have them type in their administrator password. Escape sequences could also be used to change the clipboard of a target user, although this method may not work with all terminal emulators.
The vulnerability is tracked as CVE-2024-28085, and dubbed WallEscape. It was fixed in Linux version 2.40, released in March 2024, but that means it has been present in Linux versions for the past 11 years.
While a proof-of-concept (PoC) for the vulnerability exists, and a practical application could occur, multiple factors need to align, first. For example, the attacker needs to have physical access to a Linux server, to which multiple other potential victims are already connected through the terminal. If you’re still worried about your Linux server being targeted, there is a solution. Linux released an upgrade to linux-utils v.2.40, which patches the vulnerability.
Usually, these updates are available through the LInux distribution’s standard update channel, so keep an eye out. Furthermore, system administrators can fix the issue by removing the setgid permission from the “wall” command, or by disabling the message broadcast functionality using the “mesg” command to set its flag to “n”.
Via BleepingComputer
More from TechRadar Pro
Linux devs racing to patch critical security flaw that could allow bootkit installationHere’s a list of the best firewalls around todayThese are the best endpoint security tools right now
Negativity Drives Online News Consumption
Abstract of a paper on Nature: Online media is important for society in informing and shaping opinions, hence raising the question of what drives online news consumption. Here we analyse the causal effect of negative and emotional words on news consumption using a large online dataset of viral news stories. Specifically, we conducted our analyses using a series of randomized controlled trials (N=22,743). Our dataset comprises ~105,000 different variations of news stories from Upworthy.com that generated 5.7 million clicks across more than 370 million overall impressions. Although positive words were slightly more prevalent than negative words, we found that negative words in news headlines increased consumption rates (and positive words decreased consumption rates). For a headline of average length, each additional negative word increased the click-through rate by 2.3%. Our results contribute to a better understanding of why users engage with online media.
Read more of this story at Slashdot.
Abstract of a paper on Nature: Online media is important for society in informing and shaping opinions, hence raising the question of what drives online news consumption. Here we analyse the causal effect of negative and emotional words on news consumption using a large online dataset of viral news stories. Specifically, we conducted our analyses using a series of randomized controlled trials (N=22,743). Our dataset comprises ~105,000 different variations of news stories from Upworthy.com that generated 5.7 million clicks across more than 370 million overall impressions. Although positive words were slightly more prevalent than negative words, we found that negative words in news headlines increased consumption rates (and positive words decreased consumption rates). For a headline of average length, each additional negative word increased the click-through rate by 2.3%. Our results contribute to a better understanding of why users engage with online media.
Read more of this story at Slashdot.
Bear Elite Hybrid Mattress Review 2024: A Premium Bed for Athletes Tested by Experts – CNET
Bear’s most luxurious hybrid offering is the Elite Hybrid. This enhanced style of supportive bed is targeted for athletes, so it might not be right for everyone. Here’s who we think it will work best for.
Bear’s most luxurious hybrid offering is the Elite Hybrid. This enhanced style of supportive bed is targeted for athletes, so it might not be right for everyone. Here’s who we think it will work best for.
8BitDo’s $100 wireless mechanical keyboard is a tribute to Commodore 64
The clicky Kailh White switches are easily replaceable.
Fits in nicely with old cassettes and floppy disks. [credit:
8BitDo ]
The Commodore 64 introduced a generation of future computer geeks to personal computing. The 8-bit system first launched in 1982 and was discontinued in 1994. During that time, it made its mark as one of the first and most influential personal computers, and many still remember the computer fondly.
Gaming peripherals maker 8BitDo wants to bring that nostalgia to people’s fingertips and this week announced the Retro Mechanical Keyboard – C64 Edition. 8BitDo is careful not to use the name “Commodore” outright. But with marketing images featuring retro Commodore gear in the background, press materials saying that the keyboard was “inspired by the classics,” and certain design cues, the keyboard is clearly a tribute to the ’80s keyboard-computer.
8BitDo starts with the sort of beige that you only see on new peripherals these days if the gadgets are trying to appear old. A rainbow stripe runs horizontally and north of the function row, like on Commodore’s computer. There’s a power button with a bulb popping out of the keyboard case, ready to illuminate when it receives the signal.
Blockhain Sophon Secures $10M in Funding from Renowned Investors While Shrouded in Mystery
Tortola, BVI, March 29th, 2024, Chainwire Mysterious blockchain Sophon has successfully raised $10 million led by Paper Ventures and Maven11. The funding round attracted contributions from prominent firms such as Spartan, SevenX, OKX Ventures and Huobi Ventures. With nothing more
The post Blockhain Sophon Secures $10M in Funding from Renowned Investors While Shrouded in Mystery first appeared on Tech Startups.
Tortola, BVI, March 29th, 2024, Chainwire Mysterious blockchain Sophon has successfully raised $10 million led by Paper Ventures and Maven11. The funding round attracted contributions from prominent firms such as Spartan, SevenX, OKX Ventures and Huobi Ventures. With nothing more […]
The post Blockhain Sophon Secures $10M in Funding from Renowned Investors While Shrouded in Mystery first appeared on Tech Startups.